CA2755286C - Systems and methods for document management transformation and security - Google Patents
Systems and methods for document management transformation and security Download PDFInfo
- Publication number
- CA2755286C CA2755286C CA2755286A CA2755286A CA2755286C CA 2755286 C CA2755286 C CA 2755286C CA 2755286 A CA2755286 A CA 2755286A CA 2755286 A CA2755286 A CA 2755286A CA 2755286 C CA2755286 C CA 2755286C
- Authority
- CA
- Canada
- Prior art keywords
- document
- recipient
- electronic
- documents
- view
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/4406—Restricting access, e.g. according to user identity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3246—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of data relating to permitted access or usage, e.g. level of access or usage parameters for digital rights management [DRM] related to still images
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3274—Storage or retrieval of prestored additional information
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The present invention provides systems and methods for dynamically rendering documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents).
The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents.
The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents.
Description
SYSTEMS AND METHODS FOR DOCUMENT MANAGEMENT
TRANSFORMATION AND SECURITY
BACKGROUND OF THE INVENTION
TRANSFORMATION AND SECURITY
BACKGROUND OF THE INVENTION
[0002] Today, there is no programmatic way to ensure the contract signing process happens in any particular controllable fashion. Contracts are printed out and physically distributed. Signers sign where they see fit, and may or may not complete the signing correctly. Contract pages may be lost or not returned to the proper person.
Using electronic systems, contracts can be routed using workflow, but these systems are complicated, hard to setup and manage, and usually do not involve the end-user signing process. The existence of a variety of pre-established document formats requires dynamic evaluation and verification of documents for signature. In addition, there is no system to readily restrict access of documents for signature to only those parties that are authorized to review and execute.
SUMMARY OF THE INVENTION
100031 The present invention provides systems and methods for dynamically rendering documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents). The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents.
10003a1 Accordingly, there is described a method in a server computer connected to a recipient computer system via a network connection, the method comprising:
establishing a visibility policy that governs access to electronic documents associated with a signing ceremony, by: allowing a first recipient to view an electronic document, if the document includes an instruction for the first recipient to view or sign the electronic document; allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; and denying the first recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document; receiving at the server computer a request from the first recipient to download a copy of the electronic documents associated with the first recipient; and downloading to the first recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
[000313] There is also described a system comprising: a server computer connected to a recipient computer system via a network connection, the server computer configured to establish a visibility policy that governs access to electronic documents associated with a signing ceremony, by: allowing a recipient to view an electronic document, if the document includes an instruction for that recipient to view or sign the electronic document; allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; denying the recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document; receiving at the server computer a request from a recipient to download a copy of the electronic documents associated with the recipient; and downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
100030 In a further aspect, there is described a computer implemented method of dynamically rendering documents during a signing ceremony, the method comprising:
receiving documents during a signing ceremony having tabs placed on the documents, the tabs comprising instructions to sign the document; and controlling the rendering of the documents to enable a recipient to view a document if the document includes an instruction for the recipient to sign the document, or if the document does not include any instructions for any other recipient to sign the document, and to not enable a recipient to view a document if the document includes instructions for another recipient to sign the document.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] Preferred and alternative examples of the present invention are described in detail below with reference to the following drawings:
[0005] FIGURE I is a schematic diagram of an example system formed in accordance with the present invention;
[0006] FIGURE 2 is a flow diagram of an example process performed by the system shown in FIGURE 1; and [0007] FIGURE 3 is a combined flow and system diagram.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0008] The present invention provides enhanced document management systems and methods for evaluating and transforming portable document format (PDF) documents and security restrictions on electronic document review and execution. FIGURE I
illustrates an example system 20 having an advisor computer system 30, an advisor Customer Relationship Management (CRM) server 32, a user services server 36 and a plurality of user systems 42.
[0009] FIGURE 2 illustrates an example transform process performed by the system 20. FIGURE 3 illustrates a combined system/process diagram.
PDF DOCUMENT TRANSFORMATION
100101 The evaluation and transformation of PDF documents include both input and output transformations. For Static Extensible Markup Language (XML) Forms Architecture (XFA) forms and AcroForms (aka Acrobat Forms), the system 20 correlates the form fields from an input form to fields in a system template. The form field data and - 2a -attributes are then reflected in a system signing ceremony in accordance with the rules defined in a system template (e.g., Editable vs. Read-Only, Required vs.
Optional, Assignment to individual Recipients, placement on the signed document, etc.) One function that this process enables is for the system 20 to render data that was collected from a sender-provided input form to signing parties in an editable format.
Without this transformation process, all form data from input forms is imposed on the documents in a non-editable format during the signing ceremony.
[0011] The following items are currently transferred from the input PDF into the system process:
= Field data = On/Off values for Radio Buttons (Distinct from Display Values) [0012] The following items are currently specified in the template, but may alternatively be included as optional characteristics or extensions of the transform process:
= Field placement = Field rules o Optional vs. Required o Editable vs. Read-only o Edit masks = List items in drop-down fields = Display value vs. Stored value for drop-down fields = Signature fields [0013] The following items are currently transferred from the output PDF into the system process. The system provides the form data that is collected during the signing ceremony in the same (XML) structure that it came in. This allows the systems that consume system data (post-execution) to process the data as if it was extracted from the forms that they provided to the system.
Using electronic systems, contracts can be routed using workflow, but these systems are complicated, hard to setup and manage, and usually do not involve the end-user signing process. The existence of a variety of pre-established document formats requires dynamic evaluation and verification of documents for signature. In addition, there is no system to readily restrict access of documents for signature to only those parties that are authorized to review and execute.
SUMMARY OF THE INVENTION
100031 The present invention provides systems and methods for dynamically rendering documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents). The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents.
10003a1 Accordingly, there is described a method in a server computer connected to a recipient computer system via a network connection, the method comprising:
establishing a visibility policy that governs access to electronic documents associated with a signing ceremony, by: allowing a first recipient to view an electronic document, if the document includes an instruction for the first recipient to view or sign the electronic document; allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; and denying the first recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document; receiving at the server computer a request from the first recipient to download a copy of the electronic documents associated with the first recipient; and downloading to the first recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
[000313] There is also described a system comprising: a server computer connected to a recipient computer system via a network connection, the server computer configured to establish a visibility policy that governs access to electronic documents associated with a signing ceremony, by: allowing a recipient to view an electronic document, if the document includes an instruction for that recipient to view or sign the electronic document; allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; denying the recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document; receiving at the server computer a request from a recipient to download a copy of the electronic documents associated with the recipient; and downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
100030 In a further aspect, there is described a computer implemented method of dynamically rendering documents during a signing ceremony, the method comprising:
receiving documents during a signing ceremony having tabs placed on the documents, the tabs comprising instructions to sign the document; and controlling the rendering of the documents to enable a recipient to view a document if the document includes an instruction for the recipient to sign the document, or if the document does not include any instructions for any other recipient to sign the document, and to not enable a recipient to view a document if the document includes instructions for another recipient to sign the document.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] Preferred and alternative examples of the present invention are described in detail below with reference to the following drawings:
[0005] FIGURE I is a schematic diagram of an example system formed in accordance with the present invention;
[0006] FIGURE 2 is a flow diagram of an example process performed by the system shown in FIGURE 1; and [0007] FIGURE 3 is a combined flow and system diagram.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0008] The present invention provides enhanced document management systems and methods for evaluating and transforming portable document format (PDF) documents and security restrictions on electronic document review and execution. FIGURE I
illustrates an example system 20 having an advisor computer system 30, an advisor Customer Relationship Management (CRM) server 32, a user services server 36 and a plurality of user systems 42.
[0009] FIGURE 2 illustrates an example transform process performed by the system 20. FIGURE 3 illustrates a combined system/process diagram.
PDF DOCUMENT TRANSFORMATION
100101 The evaluation and transformation of PDF documents include both input and output transformations. For Static Extensible Markup Language (XML) Forms Architecture (XFA) forms and AcroForms (aka Acrobat Forms), the system 20 correlates the form fields from an input form to fields in a system template. The form field data and - 2a -attributes are then reflected in a system signing ceremony in accordance with the rules defined in a system template (e.g., Editable vs. Read-Only, Required vs.
Optional, Assignment to individual Recipients, placement on the signed document, etc.) One function that this process enables is for the system 20 to render data that was collected from a sender-provided input form to signing parties in an editable format.
Without this transformation process, all form data from input forms is imposed on the documents in a non-editable format during the signing ceremony.
[0011] The following items are currently transferred from the input PDF into the system process:
= Field data = On/Off values for Radio Buttons (Distinct from Display Values) [0012] The following items are currently specified in the template, but may alternatively be included as optional characteristics or extensions of the transform process:
= Field placement = Field rules o Optional vs. Required o Editable vs. Read-only o Edit masks = List items in drop-down fields = Display value vs. Stored value for drop-down fields = Signature fields [0013] The following items are currently transferred from the output PDF into the system process. The system provides the form data that is collected during the signing ceremony in the same (XML) structure that it came in. This allows the systems that consume system data (post-execution) to process the data as if it was extracted from the forms that they provided to the system.
- 3 -DOCUMENT SECURITY RESTRICTIONS
[0014] Business rules currently enforced through validation by the system ensures the following behaviors:
= If any Recipient has a signature/initial task on a document, every Recipient must have a signature/initial task on the document. If there is an Envelope Recipient without a signature/initial task on a document that contains some signature/initial task, system will reject the Envelope upon creation.
= If a document does not have any signature/initial tasks for any Envelope Recipient, the document is perceived to be viewable by all Recipients, and the Envelope is allowed to be created.
[0015] The present invention dynamically renders the documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents). The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents contained within the Envelope. Preferably, the system behavior is as follows:
= If a document has a system Tab for a Recipient, the document will be visible for the Recipient.
= If a document has a system Tab for one Recipient but not another, the document will not be visible to the Recipient that lacks the system Tab.
= If the document does not have any system Tabs, the document will be visible to all Recipients.
= If a Recipient chooses to download a copy of their documents through the system web interface, only the documents that were viewable during the signing ceremony will be downloaded.
= Predetermined CertifiedDelivery and CarbonCopy Recipients will see all documents in the Envelope.
[0014] Business rules currently enforced through validation by the system ensures the following behaviors:
= If any Recipient has a signature/initial task on a document, every Recipient must have a signature/initial task on the document. If there is an Envelope Recipient without a signature/initial task on a document that contains some signature/initial task, system will reject the Envelope upon creation.
= If a document does not have any signature/initial tasks for any Envelope Recipient, the document is perceived to be viewable by all Recipients, and the Envelope is allowed to be created.
[0015] The present invention dynamically renders the documents during a signing ceremony (instead of validating that signature tasks are placed appropriately on all documents). The invention establishes a visibility policy that governs how documents are rendered, based on the state of system Tabs (instructions) placed on the documents contained within the Envelope. Preferably, the system behavior is as follows:
= If a document has a system Tab for a Recipient, the document will be visible for the Recipient.
= If a document has a system Tab for one Recipient but not another, the document will not be visible to the Recipient that lacks the system Tab.
= If the document does not have any system Tabs, the document will be visible to all Recipients.
= If a Recipient chooses to download a copy of their documents through the system web interface, only the documents that were viewable during the signing ceremony will be downloaded.
= Predetermined CertifiedDelivery and CarbonCopy Recipients will see all documents in the Envelope.
- 4 -[0016] The system preferably allows the following additional configuration options:
= Dynamically suppress access to the Certificate of Completion and Envelope History for all Signers, Certified Delivery, and Carbon Copy Recipients.
(These documents/screens display a list of all signers).
= Ability to specify system behavior as an Account-level setting or on an Envelope-basis. In one embodiment, the setting is not available for Account Administrators to manage; i.e., the Account-level setting could be specified for system users who would themselves not have the ability to change the setting.
= Ability to reflect in the Envelope History the system visibility setting.
This information is available for human readability as well as programmatic access.
= Ability to make all documents visible to the Envelope Sender.
= Ability to designate whether Members of the sending Account can see all documents, or whether they are subject to the visibility policy.
[0017] The invention methodology is better understood by reference to the following example. In this scenario, there are two signers, 51 and S2, and four documents subject to the system process, Di, D2, D3 and D4. 51 is asked to sign Dl and D2. S2 is asked to sign Dl and enter data on D4. The resulting behavior in this scenario, according to one embodiment of the present invention, is that 51 will see documents Di, D2 and D3, while S2 will see documents Di, D3 and D4.
[0018] While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.
= Dynamically suppress access to the Certificate of Completion and Envelope History for all Signers, Certified Delivery, and Carbon Copy Recipients.
(These documents/screens display a list of all signers).
= Ability to specify system behavior as an Account-level setting or on an Envelope-basis. In one embodiment, the setting is not available for Account Administrators to manage; i.e., the Account-level setting could be specified for system users who would themselves not have the ability to change the setting.
= Ability to reflect in the Envelope History the system visibility setting.
This information is available for human readability as well as programmatic access.
= Ability to make all documents visible to the Envelope Sender.
= Ability to designate whether Members of the sending Account can see all documents, or whether they are subject to the visibility policy.
[0017] The invention methodology is better understood by reference to the following example. In this scenario, there are two signers, 51 and S2, and four documents subject to the system process, Di, D2, D3 and D4. 51 is asked to sign Dl and D2. S2 is asked to sign Dl and enter data on D4. The resulting behavior in this scenario, according to one embodiment of the present invention, is that 51 will see documents Di, D2 and D3, while S2 will see documents Di, D3 and D4.
[0018] While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claims that follow.
- 5 -
Claims (17)
1. A method in a server computer connected to a recipient computer system via a network connection, the method comprising:
establishing a visibility policy that governs access to electronic documents associated with a signing ceremony, by:
allowing a first recipient to view an electronic document, if the document includes an instruction for the first recipient to view or sign the electronic document;
allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; and denying the first recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document;
receiving at the server computer a request from the first recipient to download a copy of the electronic documents associated with the first recipient; and downloading to the first recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
establishing a visibility policy that governs access to electronic documents associated with a signing ceremony, by:
allowing a first recipient to view an electronic document, if the document includes an instruction for the first recipient to view or sign the electronic document;
allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions; and denying the first recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document;
receiving at the server computer a request from the first recipient to download a copy of the electronic documents associated with the first recipient; and downloading to the first recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
2. The method of claim 1, further comprising rejecting creation of an envelope for an electronic document that contains a signature/initial task for the first recipient, if the envelope includes the second recipient without a signature/initial task on the document.
3. The method of claim 1, further comprising allowing creation of an envelope for an electronic document, if the document does not contain any signature/initial tasks for any recipients.
4. The method of claim 1, further comprising allowing predetermined certified delivery recipients and/or carbon copy recipients to view all electronic documents in an envelope.
5. The method of claim 1, further comprising dynamically suppressing access to a certificate of completion and/or envelope history for one or more of: document signers, certified delivery recipients, and carbon copy recipients.
6. The method of claim 1, further comprising allowing a sender of an envelope to view all documents in the envelope.
7. The method of claim 1, further comprising designating whether all members of a sending account can view all of the electronic documents associated with the signing ceremony or whether the members of the sending account are subject to the visibility policy.
8. The method of claim 1, wherein establishing the visibility policy is based on tabs placed on the electronic documents associated with the signing ceremony.
9. The method of claim 8, wherein the electronic documents associated with the signing ceremony are represented in portable document format.
10. The method of claim 1, wherein downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony includes downloading the electronic documents via a web interface.
11. A system comprising:
a server computer connected to a recipient computer system via a network connection, the server computer configured to establish a visibility policy that governs access to electronic documents associated with a signing ceremony, by:
allowing a recipient to view an electronic document, if the document includes an instruction for that recipient to view or sign the electronic document;
allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions;
denying the recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document;
receiving at the server computer a request from a recipient to download a copy of the electronic documents associated with the recipient; and downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
a server computer connected to a recipient computer system via a network connection, the server computer configured to establish a visibility policy that governs access to electronic documents associated with a signing ceremony, by:
allowing a recipient to view an electronic document, if the document includes an instruction for that recipient to view or sign the electronic document;
allowing all recipients to view an electronic document, if the document does not include any viewing or signing instructions;
denying the recipient access to the electronic document, if the document only includes instructions allowing a second recipient to view or sign the document;
receiving at the server computer a request from a recipient to download a copy of the electronic documents associated with the recipient; and downloading to the recipient computer system only electronic documents that were identified as viewable during the signing ceremony.
12. The system of claim 11, wherein the server computer is further configured to:
reject creation of an envelope for an electronic document that contains a signature/initial task for a first recipient, if the envelope includes a second recipient without a signature/initial task on the document; and allow creation of an envelope for an electronic document, if the document does not contain any signature/initial tasks for any recipients.
reject creation of an envelope for an electronic document that contains a signature/initial task for a first recipient, if the envelope includes a second recipient without a signature/initial task on the document; and allow creation of an envelope for an electronic document, if the document does not contain any signature/initial tasks for any recipients.
13. The system of claim 11, wherein the server computer is further configured to based on the visibility policy, suppress access to a certificate of completion and/or envelope history for one or more of: document signers, certified delivery recipients, and carbon copy recipients.
14. The system of claim 11, wherein the server computer includes a web interface for downloading the electronic documents associated with a signing ceremony, wherein the electronic documents associated with the signing ceremony are represented in portable document format, and wherein the visibility policy is based on tabs placed on the electronic documents associated with the signing ceremony.
15. A computer implemented method of dynamically rendering documents during a signing ceremony, the method comprising:
receiving documents during a signing ceremony having tabs placed on the documents, the tabs comprising instructions to sign the document; and controlling the rendering of the documents to enable a recipient to view a document if the document includes an instruction for the recipient to sign the document, or if the document does not include any instructions for any other recipient to sign the document, and to not enable a recipient to view a document if the document includes instructions for another recipient to sign the document.
receiving documents during a signing ceremony having tabs placed on the documents, the tabs comprising instructions to sign the document; and controlling the rendering of the documents to enable a recipient to view a document if the document includes an instruction for the recipient to sign the document, or if the document does not include any instructions for any other recipient to sign the document, and to not enable a recipient to view a document if the document includes instructions for another recipient to sign the document.
16. The computer implemented method according to claim 15, wherein the tabs comprise instructions to sign the document and enter data on the document.
17. The computer implemented method according to claim 15 or 16, including requesting the download of a copy of documents rendered during a signing ceremony, and only receiving documents that were rendered for the recipient during the signing ceremony.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16023709P | 2009-03-13 | 2009-03-13 | |
US61/160,237 | 2009-03-13 | ||
PCT/US2010/027326 WO2010105262A1 (en) | 2009-03-13 | 2010-03-15 | Systems and methods for document management transformation and security |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2755286A1 CA2755286A1 (en) | 2010-09-16 |
CA2755286C true CA2755286C (en) | 2017-08-29 |
Family
ID=42728846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2755286A Active CA2755286C (en) | 2009-03-13 | 2010-03-15 | Systems and methods for document management transformation and security |
Country Status (8)
Country | Link |
---|---|
US (1) | US8239496B2 (en) |
EP (1) | EP2406715A4 (en) |
JP (1) | JP5889638B2 (en) |
CN (1) | CN102422269B (en) |
AU (1) | AU2010223873B2 (en) |
CA (1) | CA2755286C (en) |
SG (2) | SG10201400603VA (en) |
WO (1) | WO2010105262A1 (en) |
Families Citing this family (178)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
US8528086B1 (en) | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
US8566946B1 (en) | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US9106694B2 (en) | 2004-04-01 | 2015-08-11 | Fireeye, Inc. | Electronic message analysis for malware detection |
US8539582B1 (en) | 2004-04-01 | 2013-09-17 | Fireeye, Inc. | Malware containment and security analysis on connection |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US8793787B2 (en) | 2004-04-01 | 2014-07-29 | Fireeye, Inc. | Detecting malicious network content using virtual environment components |
US8375444B2 (en) | 2006-04-20 | 2013-02-12 | Fireeye, Inc. | Dynamic signature creation and enforcement |
US7587537B1 (en) | 2007-11-30 | 2009-09-08 | Altera Corporation | Serializer-deserializer circuits formed from input-output circuit registers |
US8898788B1 (en) | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
US8881282B1 (en) | 2004-04-01 | 2014-11-04 | Fireeye, Inc. | Systems and methods for malware attack detection and identification |
US9514117B2 (en) | 2007-02-28 | 2016-12-06 | Docusign, Inc. | System and method for document tagging templates |
US8655961B2 (en) | 2007-07-18 | 2014-02-18 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8949706B2 (en) | 2007-07-18 | 2015-02-03 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US7930447B2 (en) | 2008-10-17 | 2011-04-19 | International Business Machines Corporation | Listing windows of active applications of computing devices sharing a keyboard based upon requests for attention |
US8997219B2 (en) | 2008-11-03 | 2015-03-31 | Fireeye, Inc. | Systems and methods for detecting malicious PDF network content |
US8850571B2 (en) | 2008-11-03 | 2014-09-30 | Fireeye, Inc. | Systems and methods for detecting malicious network content |
US8484723B2 (en) | 2009-06-05 | 2013-07-09 | Signix, Inc. | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer |
US8832829B2 (en) | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
US9251131B2 (en) | 2010-05-04 | 2016-02-02 | Docusign, Inc. | Systems and methods for distributed electronic signature documents including version control |
EP2580705B1 (en) | 2010-06-11 | 2018-08-08 | DocuSign, Inc. | Web-based electronically signed documents |
US9064238B2 (en) | 2011-03-04 | 2015-06-23 | Factify | Method and apparatus for certification of facts |
US9268758B2 (en) | 2011-07-14 | 2016-02-23 | Docusign, Inc. | Method for associating third party content with online document signing |
US9824198B2 (en) | 2011-07-14 | 2017-11-21 | Docusign, Inc. | System and method for identity and reputation score based on transaction history |
AU2012283810A1 (en) | 2011-07-14 | 2014-02-06 | Docusign, Inc. | Online signature identity and verification in community |
US10511732B2 (en) | 2011-08-25 | 2019-12-17 | Docusign, Inc. | Mobile solution for importing and signing third-party electronic signature documents |
EP2748721B1 (en) * | 2011-08-25 | 2022-10-05 | DocuSign, Inc. | Mobile solution for signing and retaining third-party documents |
WO2013058846A1 (en) | 2011-10-18 | 2013-04-25 | Dotloop, Llc | Systems, methods and apparatus for form building |
US9519782B2 (en) | 2012-02-24 | 2016-12-13 | Fireeye, Inc. | Detecting malicious network content |
US9230130B2 (en) | 2012-03-22 | 2016-01-05 | Docusign, Inc. | System and method for rules-based control of custody of electronic signature transactions |
US10572665B2 (en) | 2012-12-28 | 2020-02-25 | Fireeye, Inc. | System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events |
US10826951B2 (en) | 2013-02-11 | 2020-11-03 | Dotloop, Llc | Electronic content sharing |
US9824209B1 (en) | 2013-02-23 | 2017-11-21 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications that is usable to harden in the field code |
US9009823B1 (en) | 2013-02-23 | 2015-04-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications installed on mobile devices |
US9176843B1 (en) | 2013-02-23 | 2015-11-03 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications |
US9009822B1 (en) | 2013-02-23 | 2015-04-14 | Fireeye, Inc. | Framework for multi-phase analysis of mobile applications |
US9367681B1 (en) | 2013-02-23 | 2016-06-14 | Fireeye, Inc. | Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application |
US9159035B1 (en) | 2013-02-23 | 2015-10-13 | Fireeye, Inc. | Framework for computer application analysis of sensitive information tracking |
US8990944B1 (en) | 2013-02-23 | 2015-03-24 | Fireeye, Inc. | Systems and methods for automatically detecting backdoors |
US9195829B1 (en) | 2013-02-23 | 2015-11-24 | Fireeye, Inc. | User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications |
WO2014138120A1 (en) * | 2013-03-04 | 2014-09-12 | Docusign, Inc. | Systems and methods for cloud data security |
US9626509B1 (en) | 2013-03-13 | 2017-04-18 | Fireeye, Inc. | Malicious content analysis with multi-version application support within single operating environment |
US9565202B1 (en) | 2013-03-13 | 2017-02-07 | Fireeye, Inc. | System and method for detecting exfiltration content |
US9355247B1 (en) | 2013-03-13 | 2016-05-31 | Fireeye, Inc. | File extraction from memory dump for malicious content analysis |
US9104867B1 (en) | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
US9311479B1 (en) | 2013-03-14 | 2016-04-12 | Fireeye, Inc. | Correlation and consolidation of analytic data for holistic view of a malware attack |
US9430646B1 (en) | 2013-03-14 | 2016-08-30 | Fireeye, Inc. | Distributed systems and methods for automatically detecting unknown bots and botnets |
US9251343B1 (en) | 2013-03-15 | 2016-02-02 | Fireeye, Inc. | Detecting bootkits resident on compromised computers |
US9413781B2 (en) | 2013-03-15 | 2016-08-09 | Fireeye, Inc. | System and method employing structured intelligence to verify and contain threats at endpoints |
US10713358B2 (en) | 2013-03-15 | 2020-07-14 | Fireeye, Inc. | System and method to extract and utilize disassembly features to classify software intent |
US9575622B1 (en) | 2013-04-02 | 2017-02-21 | Dotloop, Llc | Systems and methods for electronic signature |
US9495180B2 (en) | 2013-05-10 | 2016-11-15 | Fireeye, Inc. | Optimized resource allocation for virtual machines within a malware content detection system |
US9635039B1 (en) | 2013-05-13 | 2017-04-25 | Fireeye, Inc. | Classifying sets of malicious indicators for detecting command and control communications associated with malware |
US10133863B2 (en) | 2013-06-24 | 2018-11-20 | Fireeye, Inc. | Zero-day discovery system |
US9536091B2 (en) | 2013-06-24 | 2017-01-03 | Fireeye, Inc. | System and method for detecting time-bomb malware |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9888016B1 (en) | 2013-06-28 | 2018-02-06 | Fireeye, Inc. | System and method for detecting phishing using password prediction |
US9223528B2 (en) * | 2013-07-30 | 2015-12-29 | Konica Minolta Laboratory U.S.A., Inc. | Electronic content management workflow |
EP3039610A1 (en) * | 2013-08-27 | 2016-07-06 | Agfa Healthcare | System and method for processing documents |
US10192052B1 (en) | 2013-09-30 | 2019-01-29 | Fireeye, Inc. | System, apparatus and method for classifying a file as malicious using static scanning |
US9171160B2 (en) | 2013-09-30 | 2015-10-27 | Fireeye, Inc. | Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses |
US9628507B2 (en) | 2013-09-30 | 2017-04-18 | Fireeye, Inc. | Advanced persistent threat (APT) detection center |
US9736179B2 (en) | 2013-09-30 | 2017-08-15 | Fireeye, Inc. | System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection |
US10515214B1 (en) | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
US9690936B1 (en) | 2013-09-30 | 2017-06-27 | Fireeye, Inc. | Multistage system and method for analyzing obfuscated content for malware |
US10089461B1 (en) | 2013-09-30 | 2018-10-02 | Fireeye, Inc. | Page replacement code injection |
US9294501B2 (en) | 2013-09-30 | 2016-03-22 | Fireeye, Inc. | Fuzzy hash of behavioral results |
US9189627B1 (en) | 2013-11-21 | 2015-11-17 | Fireeye, Inc. | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US9747446B1 (en) | 2013-12-26 | 2017-08-29 | Fireeye, Inc. | System and method for run-time object classification |
US9740857B2 (en) | 2014-01-16 | 2017-08-22 | Fireeye, Inc. | Threat-aware microvisor |
WO2015120086A1 (en) | 2014-02-04 | 2015-08-13 | Shoobx, Inc. | Computer-guided corporate governance with document generation and execution |
US9262635B2 (en) | 2014-02-05 | 2016-02-16 | Fireeye, Inc. | Detection efficacy of virtual machine-based analysis with application specific events |
US10552525B1 (en) | 2014-02-12 | 2020-02-04 | Dotloop, Llc | Systems, methods and apparatuses for automated form templating |
US9241010B1 (en) | 2014-03-20 | 2016-01-19 | Fireeye, Inc. | System and method for network behavior detection |
US10242185B1 (en) | 2014-03-21 | 2019-03-26 | Fireeye, Inc. | Dynamic guest image creation and rollback |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9223972B1 (en) | 2014-03-31 | 2015-12-29 | Fireeye, Inc. | Dynamically remote tuning of a malware content detection system |
US9432389B1 (en) | 2014-03-31 | 2016-08-30 | Fireeye, Inc. | System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object |
US9594912B1 (en) | 2014-06-06 | 2017-03-14 | Fireeye, Inc. | Return-oriented programming detection |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
US10002252B2 (en) | 2014-07-01 | 2018-06-19 | Fireeye, Inc. | Verification of trusted threat-aware microvisor |
US10733364B1 (en) | 2014-09-02 | 2020-08-04 | Dotloop, Llc | Simplified form interface system and method |
US10671726B1 (en) | 2014-09-22 | 2020-06-02 | Fireeye Inc. | System and method for malware analysis using thread-level event monitoring |
US9773112B1 (en) | 2014-09-29 | 2017-09-26 | Fireeye, Inc. | Exploit detection of malware and malware families |
US10027689B1 (en) | 2014-09-29 | 2018-07-17 | Fireeye, Inc. | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families |
US11494711B2 (en) | 2014-11-19 | 2022-11-08 | Shoobx, Inc. | Computer-guided corporate relationship management |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US10075455B2 (en) | 2014-12-26 | 2018-09-11 | Fireeye, Inc. | Zero-day rotating guest image profile |
US9934376B1 (en) | 2014-12-29 | 2018-04-03 | Fireeye, Inc. | Malware detection appliance architecture |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US9690606B1 (en) | 2015-03-25 | 2017-06-27 | Fireeye, Inc. | Selective system call monitoring |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US9438613B1 (en) | 2015-03-30 | 2016-09-06 | Fireeye, Inc. | Dynamic content activation for automated analysis of embedded objects |
US10417031B2 (en) | 2015-03-31 | 2019-09-17 | Fireeye, Inc. | Selective virtualization for security threat detection |
US9483644B1 (en) | 2015-03-31 | 2016-11-01 | Fireeye, Inc. | Methods for detecting file altering malware in VM based analysis |
US10474813B1 (en) | 2015-03-31 | 2019-11-12 | Fireeye, Inc. | Code injection technique for remediation at an endpoint of a network |
US9654485B1 (en) | 2015-04-13 | 2017-05-16 | Fireeye, Inc. | Analytics-based security monitoring system and method |
US9594904B1 (en) | 2015-04-23 | 2017-03-14 | Fireeye, Inc. | Detecting malware based on reflection |
US11113086B1 (en) | 2015-06-30 | 2021-09-07 | Fireeye, Inc. | Virtual system and method for securing external network connectivity |
US10642753B1 (en) | 2015-06-30 | 2020-05-05 | Fireeye, Inc. | System and method for protecting a software component running in virtual machine using a virtualization layer |
US10726127B1 (en) | 2015-06-30 | 2020-07-28 | Fireeye, Inc. | System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer |
US10454950B1 (en) | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US10715542B1 (en) | 2015-08-14 | 2020-07-14 | Fireeye, Inc. | Mobile application risk analysis |
US10176321B2 (en) | 2015-09-22 | 2019-01-08 | Fireeye, Inc. | Leveraging behavior-based rules for malware family classification |
US10033747B1 (en) | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
US10601865B1 (en) | 2015-09-30 | 2020-03-24 | Fireeye, Inc. | Detection of credential spearphishing attacks using email analysis |
US10210329B1 (en) | 2015-09-30 | 2019-02-19 | Fireeye, Inc. | Method to detect application execution hijacking using memory protection |
US9825976B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Detection and classification of exploit kits |
US9825989B1 (en) | 2015-09-30 | 2017-11-21 | Fireeye, Inc. | Cyber attack early warning system |
US10817606B1 (en) | 2015-09-30 | 2020-10-27 | Fireeye, Inc. | Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic |
US10706149B1 (en) | 2015-09-30 | 2020-07-07 | Fireeye, Inc. | Detecting delayed activation malware using a primary controller and plural time controllers |
US10284575B2 (en) | 2015-11-10 | 2019-05-07 | Fireeye, Inc. | Launcher for setting analysis environment variations for malware detection |
US10846117B1 (en) | 2015-12-10 | 2020-11-24 | Fireeye, Inc. | Technique for establishing secure communication between host and guest processes of a virtualization architecture |
US10447728B1 (en) | 2015-12-10 | 2019-10-15 | Fireeye, Inc. | Technique for protecting guest processes using a layered virtualization architecture |
US10108446B1 (en) | 2015-12-11 | 2018-10-23 | Fireeye, Inc. | Late load technique for deploying a virtualization layer underneath a running operating system |
US10565378B1 (en) | 2015-12-30 | 2020-02-18 | Fireeye, Inc. | Exploit of privilege detection framework |
US10133866B1 (en) | 2015-12-30 | 2018-11-20 | Fireeye, Inc. | System and method for triggering analysis of an object for malware in response to modification of that object |
US10621338B1 (en) | 2015-12-30 | 2020-04-14 | Fireeye, Inc. | Method to detect forgery and exploits using last branch recording registers |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US9824216B1 (en) | 2015-12-31 | 2017-11-21 | Fireeye, Inc. | Susceptible environment detection system |
US10581874B1 (en) | 2015-12-31 | 2020-03-03 | Fireeye, Inc. | Malware detection system with contextual analysis |
US11552986B1 (en) | 2015-12-31 | 2023-01-10 | Fireeye Security Holdings Us Llc | Cyber-security framework for application of virtual features |
US10601863B1 (en) | 2016-03-25 | 2020-03-24 | Fireeye, Inc. | System and method for managing sensor enrollment |
US10785255B1 (en) | 2016-03-25 | 2020-09-22 | Fireeye, Inc. | Cluster configuration within a scalable malware detection system |
US10476906B1 (en) | 2016-03-25 | 2019-11-12 | Fireeye, Inc. | System and method for managing formation and modification of a cluster within a malware detection system |
US10671721B1 (en) | 2016-03-25 | 2020-06-02 | Fireeye, Inc. | Timeout management services |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10169585B1 (en) | 2016-06-22 | 2019-01-01 | Fireeye, Inc. | System and methods for advanced malware detection through placement of transition events |
US10462173B1 (en) | 2016-06-30 | 2019-10-29 | Fireeye, Inc. | Malware detection verification and enhancement by coordinating endpoint and malware detection systems |
US20180024807A1 (en) * | 2016-07-21 | 2018-01-25 | Vision Menu, Inc. | System and Method of Document and Signature Management |
WO2018039774A1 (en) | 2016-09-02 | 2018-03-08 | FutureVault Inc. | Systems and methods for sharing documents |
CA3035277A1 (en) | 2016-09-02 | 2018-03-08 | FutureVault Inc. | Real-time document filtering systems and methods |
AU2017320475B2 (en) | 2016-09-02 | 2022-02-10 | FutureVault Inc. | Automated document filing and processing methods and systems |
US10592678B1 (en) | 2016-09-09 | 2020-03-17 | Fireeye, Inc. | Secure communications between peers using a verified virtual trusted platform module |
US10491627B1 (en) | 2016-09-29 | 2019-11-26 | Fireeye, Inc. | Advanced malware detection using similarity analysis |
US10795991B1 (en) | 2016-11-08 | 2020-10-06 | Fireeye, Inc. | Enterprise search |
US10587647B1 (en) | 2016-11-22 | 2020-03-10 | Fireeye, Inc. | Technique for malware detection capability comparison of network security devices |
US10581879B1 (en) | 2016-12-22 | 2020-03-03 | Fireeye, Inc. | Enhanced malware detection for generated objects |
US10552610B1 (en) | 2016-12-22 | 2020-02-04 | Fireeye, Inc. | Adaptive virtual machine snapshot update framework for malware behavioral analysis |
US10523609B1 (en) | 2016-12-27 | 2019-12-31 | Fireeye, Inc. | Multi-vector malware detection and analysis |
US11182549B2 (en) | 2017-03-06 | 2021-11-23 | AppExtremes, LLC | Systems and methods for modifying and reconciling negotiated documents |
US10904286B1 (en) | 2017-03-24 | 2021-01-26 | Fireeye, Inc. | Detection of phishing attacks using similarity analysis |
US10902119B1 (en) | 2017-03-30 | 2021-01-26 | Fireeye, Inc. | Data extraction system for malware analysis |
US10848397B1 (en) | 2017-03-30 | 2020-11-24 | Fireeye, Inc. | System and method for enforcing compliance with subscription requirements for cyber-attack detection service |
US10798112B2 (en) | 2017-03-30 | 2020-10-06 | Fireeye, Inc. | Attribute-controlled malware detection |
US10791138B1 (en) | 2017-03-30 | 2020-09-29 | Fireeye, Inc. | Subscription-based malware detection |
US10855700B1 (en) | 2017-06-29 | 2020-12-01 | Fireeye, Inc. | Post-intrusion detection of cyber-attacks during lateral movement within networks |
US10503904B1 (en) | 2017-06-29 | 2019-12-10 | Fireeye, Inc. | Ransomware detection and mitigation |
US10601848B1 (en) | 2017-06-29 | 2020-03-24 | Fireeye, Inc. | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators |
US10893068B1 (en) | 2017-06-30 | 2021-01-12 | Fireeye, Inc. | Ransomware file modification prevention technique |
US11003654B2 (en) | 2017-09-20 | 2021-05-11 | AppExtremes, LLC | Systems and methods for requesting, tracking and reporting modifications to a record |
US10747872B1 (en) | 2017-09-27 | 2020-08-18 | Fireeye, Inc. | System and method for preventing malware evasion |
US10805346B2 (en) | 2017-10-01 | 2020-10-13 | Fireeye, Inc. | Phishing attack detection |
US11108809B2 (en) | 2017-10-27 | 2021-08-31 | Fireeye, Inc. | System and method for analyzing binary code for malware classification using artificial neural network techniques |
US11271955B2 (en) | 2017-12-28 | 2022-03-08 | Fireeye Security Holdings Us Llc | Platform and method for retroactive reclassification employing a cybersecurity-based global data store |
US11005860B1 (en) | 2017-12-28 | 2021-05-11 | Fireeye, Inc. | Method and system for efficient cybersecurity analysis of endpoint events |
US11240275B1 (en) | 2017-12-28 | 2022-02-01 | Fireeye Security Holdings Us Llc | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture |
US10826931B1 (en) | 2018-03-29 | 2020-11-03 | Fireeye, Inc. | System and method for predicting and mitigating cybersecurity system misconfigurations |
US11003773B1 (en) | 2018-03-30 | 2021-05-11 | Fireeye, Inc. | System and method for automatically generating malware detection rule recommendations |
US10956477B1 (en) | 2018-03-30 | 2021-03-23 | Fireeye, Inc. | System and method for detecting malicious scripts through natural language processing modeling |
US11558401B1 (en) | 2018-03-30 | 2023-01-17 | Fireeye Security Holdings Us Llc | Multi-vector malware detection data sharing system for improved detection |
US11314859B1 (en) | 2018-06-27 | 2022-04-26 | FireEye Security Holdings, Inc. | Cyber-security system and method for detecting escalation of privileges within an access token |
US11075930B1 (en) | 2018-06-27 | 2021-07-27 | Fireeye, Inc. | System and method for detecting repetitive cybersecurity attacks constituting an email campaign |
US11228491B1 (en) | 2018-06-28 | 2022-01-18 | Fireeye Security Holdings Us Llc | System and method for distributed cluster configuration monitoring and management |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US11182473B1 (en) | 2018-09-13 | 2021-11-23 | Fireeye Security Holdings Us Llc | System and method for mitigating cyberattacks against processor operability by a guest process |
US11763004B1 (en) | 2018-09-27 | 2023-09-19 | Fireeye Security Holdings Us Llc | System and method for bootkit detection |
US11368475B1 (en) | 2018-12-21 | 2022-06-21 | Fireeye Security Holdings Us Llc | System and method for scanning remote services to locate stored objects with malware |
US11636431B2 (en) | 2019-01-04 | 2023-04-25 | AppExtremes, LLC | Systems and methods for dynamic assignment, monitoring and management of discrete tasks |
US11258806B1 (en) | 2019-06-24 | 2022-02-22 | Mandiant, Inc. | System and method for automatically associating cybersecurity intelligence to cyberthreat actors |
US11556640B1 (en) | 2019-06-27 | 2023-01-17 | Mandiant, Inc. | Systems and methods for automated cybersecurity analysis of extracted binary string sets |
US11392700B1 (en) | 2019-06-28 | 2022-07-19 | Fireeye Security Holdings Us Llc | System and method for supporting cross-platform data verification |
US11886585B1 (en) | 2019-09-27 | 2024-01-30 | Musarubra Us Llc | System and method for identifying and mitigating cyberattacks through malicious position-independent code execution |
US11637862B1 (en) | 2019-09-30 | 2023-04-25 | Mandiant, Inc. | System and method for surfacing cyber-security threats with a self-learning recommendation engine |
Family Cites Families (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5220675A (en) | 1990-01-08 | 1993-06-15 | Microsoft Corporation | Method and system for customizing a user interface in an integrated environment |
AU662805B2 (en) | 1992-04-06 | 1995-09-14 | Addison M. Fischer | A method for processing information among computers which may exchange messages |
US5222138A (en) | 1992-08-06 | 1993-06-22 | Balabon Sam D | Remote signature rendering system & apparatus |
US5465299A (en) | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
JP2762909B2 (en) | 1993-12-27 | 1998-06-11 | 日本電気株式会社 | Electronic signature device |
US5544255A (en) | 1994-08-31 | 1996-08-06 | Peripheral Vision Limited | Method and system for the capture, storage, transport and authentication of handwritten signatures |
US6367013B1 (en) | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US5615268A (en) | 1995-01-17 | 1997-03-25 | Document Authentication Systems, Inc. | System and method for electronic transmission storage and retrieval of authenticated documents |
US5748738A (en) | 1995-01-17 | 1998-05-05 | Document Authentication Systems, Inc. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US7162635B2 (en) | 1995-01-17 | 2007-01-09 | Eoriginal, Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
DE69638018D1 (en) | 1995-02-13 | 2009-10-15 | Intertrust Tech Corp | Systems and procedures for managing secure transactions and protecting electronic rights |
US5553145A (en) | 1995-03-21 | 1996-09-03 | Micali; Silvia | Simultaneous electronic transactions with visible trusted parties |
US5813009A (en) | 1995-07-28 | 1998-09-22 | Univirtual Corp. | Computer based records management system method |
US6327656B2 (en) | 1996-07-03 | 2001-12-04 | Timestamp.Com, Inc. | Apparatus and method for electronic document certification and verification |
US5898156A (en) | 1996-08-29 | 1999-04-27 | Lucent Technologies Inc. | Validation stamps for electronic signatures |
US6470448B1 (en) | 1996-10-30 | 2002-10-22 | Fujitsu Limited | Apparatus and method for proving transaction between users in network environment |
JP2001508883A (en) | 1996-12-20 | 2001-07-03 | ファイナンシャル サーヴィシーズ テクノロジー コンソーティアム | Method and system for processing electronic documents |
US5872848A (en) | 1997-02-18 | 1999-02-16 | Arcanvs | Method and apparatus for witnessed authentication of electronic documents |
US6119229A (en) | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
US6128740A (en) | 1997-12-08 | 2000-10-03 | Entrust Technologies Limited | Computer security system and method with on demand publishing of certificate revocation lists |
US6199052B1 (en) | 1998-03-06 | 2001-03-06 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary with archive and verification request services |
CA2242130A1 (en) | 1998-08-07 | 2000-02-07 | Silanis Technology Inc. | Method for parallel approval of documents in a distributed network |
US6615348B1 (en) | 1999-04-16 | 2003-09-02 | Intel Corporation | Method and apparatus for an adapted digital signature |
US6210276B1 (en) | 1998-08-25 | 2001-04-03 | Wayne L. Mullins | Game with multiple incentives and multiple levels of game play and combined lottery game with time of purchase win progressive jackpot |
CA2246049A1 (en) | 1998-09-25 | 2000-03-25 | Silanis Technology Inc. | Method of creating authenticated verifiable reproductions of electronic documents |
US6321333B1 (en) | 1998-10-14 | 2001-11-20 | Wave Systems Corporation | Efficient digital certificate processing in a data processing system |
US6584466B1 (en) | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US6671805B1 (en) * | 1999-06-17 | 2003-12-30 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
CA2272723A1 (en) | 1999-05-25 | 2000-11-25 | Rdm Corporation | Digital signature server |
EP1055989A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for digitally signing a document |
US6785815B1 (en) | 1999-06-08 | 2004-08-31 | Intertrust Technologies Corp. | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US6367010B1 (en) | 1999-07-02 | 2002-04-02 | Postx Corporation | Method for generating secure symmetric encryption and decryption |
US6289460B1 (en) | 1999-09-13 | 2001-09-11 | Astus Corporation | Document management system |
US6931420B1 (en) | 1999-09-24 | 2005-08-16 | Silanis Technology Inc. | Method for the separate authentication of a template and user data |
US20030078880A1 (en) * | 1999-10-08 | 2003-04-24 | Nancy Alley | Method and system for electronically signing and processing digital documents |
JP4011243B2 (en) | 1999-10-15 | 2007-11-21 | 富士通株式会社 | Electronic original management apparatus and method |
US7237114B1 (en) * | 2000-04-26 | 2007-06-26 | Pronvest, Inc. | Method and system for signing and authenticating electronic documents |
US6796489B2 (en) | 2000-06-06 | 2004-09-28 | Ingeo Systems, Inc. | Processing electronic documents with embedded digital signatures |
WO2001095078A1 (en) | 2000-06-06 | 2001-12-13 | Ingeo Systems, Inc. | Creating and verifying electronic documents |
US20020019937A1 (en) | 2000-06-06 | 2002-02-14 | Edstrom Trevor W. | Secure document transport process |
JP4134494B2 (en) | 2000-06-15 | 2008-08-20 | 株式会社日立製作所 | Contract method and contract processing system |
WO2001099388A2 (en) | 2000-06-21 | 2001-12-27 | Docutouch Corporation | Digital signature system and method |
WO2002017539A2 (en) | 2000-08-18 | 2002-02-28 | Distributed Trust Management Inc. | Distributed information system and protocol for affixing electronic signatures and authenticating documents |
US6944648B2 (en) | 2000-09-22 | 2005-09-13 | Docusign, Inc. | System and method for managing transferable records |
JP2002139997A (en) * | 2000-11-02 | 2002-05-17 | Dainippon Printing Co Ltd | Electronic sealing system |
US7100045B2 (en) | 2000-11-22 | 2006-08-29 | Kabushiki Kaisha Toshiba | System, method, and program for ensuring originality |
AU2002237759A1 (en) | 2001-01-05 | 2002-07-16 | Yozons, Inc. | System and method for processing digital documents utilizing secure communications over a network |
SG111920A1 (en) * | 2001-09-03 | 2005-06-29 | Trusted Hub Pte Ltd | Authentication of electronic documents |
US7395436B1 (en) | 2002-01-31 | 2008-07-01 | Kerry Nemovicher | Methods, software programs, and systems for electronic information security |
JP2003271529A (en) * | 2002-03-18 | 2003-09-26 | Honda Motor Co Ltd | Proposal document circulation system, proposal document circulation method, management server, proponent terminal, browser terminal and recording medium |
US7562053B2 (en) | 2002-04-02 | 2009-07-14 | Soluble Technologies, Llc | System and method for facilitating transactions between two or more parties |
EP1376311B1 (en) | 2002-06-17 | 2008-06-04 | Silanis Technology Inc. | System and method for creating, vaulting, transferring and controlling transferable electronic records with unique ownership |
AU2003285136A1 (en) * | 2002-11-04 | 2004-06-07 | Timothy K. Ford | Method and system for comprehensive real estate transaction management |
US7581105B2 (en) | 2003-12-16 | 2009-08-25 | Sap Aktiengesellschaft | Electronic signing apparatus and methods |
US7523315B2 (en) * | 2003-12-22 | 2009-04-21 | Ingeo Systems, Llc | Method and process for creating an electronically signed document |
US8572388B2 (en) | 2004-03-10 | 2013-10-29 | Elynx, Ltd. | Electronic document management system |
US7568101B1 (en) | 2004-05-13 | 2009-07-28 | Microsoft Corporation | Digital signatures with an embedded view |
US7568104B2 (en) | 2005-01-19 | 2009-07-28 | International Business Machines Corporation | Method and apparatus for adding signature information to electronic documents |
US8221210B2 (en) | 2005-03-08 | 2012-07-17 | Scientific Games International, Inc. | Lottery game having secondary game with multiplier and second payout |
US20060259440A1 (en) * | 2005-05-13 | 2006-11-16 | Keycorp | Method and system for electronically signing a document |
US7654529B2 (en) | 2005-05-17 | 2010-02-02 | Scientific Games International, Inc. | Combination scratch ticket and on-line game ticket |
US7554576B2 (en) * | 2005-06-20 | 2009-06-30 | Ricoh Company, Ltd. | Information capture and recording system for controlling capture devices |
US7442122B2 (en) | 2005-07-26 | 2008-10-28 | Advanced Gaming Concepts, Llc | Variable lottery game allowing participation in several different lottery games within a single drawing |
US7890659B2 (en) * | 2005-12-15 | 2011-02-15 | Microsoft Corporation | Conforming web services to an updated contract |
JP4821307B2 (en) * | 2005-12-21 | 2011-11-24 | 沖電気工業株式会社 | Contract reception terminal and contract system |
JP4137951B2 (en) * | 2006-03-28 | 2008-08-20 | シャープ株式会社 | Image processing apparatus, system, information processing apparatus, and program |
JP2008077340A (en) * | 2006-09-20 | 2008-04-03 | Oki Electric Ind Co Ltd | Contract reception terminal and contract system |
JP2008083823A (en) * | 2006-09-26 | 2008-04-10 | Oki Electric Ind Co Ltd | Contract acceptance terminal and contract system |
US20080097777A1 (en) * | 2006-10-23 | 2008-04-24 | Ctm Software Corporation | Electronic document execution |
US9514117B2 (en) * | 2007-02-28 | 2016-12-06 | Docusign, Inc. | System and method for document tagging templates |
JP2008217462A (en) * | 2007-03-05 | 2008-09-18 | Oki Electric Ind Co Ltd | Contract system |
JP2008225527A (en) * | 2007-03-08 | 2008-09-25 | Tadayuki Hattori | General-purpose and safe home computing platform for preventing authority from being centralized on system manager for achieving communication and workflow for each "home or family" |
JP2008234500A (en) * | 2007-03-23 | 2008-10-02 | Oki Electric Ind Co Ltd | Loan contract receiving terminal and loan contracting system |
MX2010000619A (en) * | 2007-07-17 | 2010-05-17 | William Howard Peirson Jr | Systems and processes for obtaining and managing electronic signatures for real estate transaction documents. |
US8949706B2 (en) * | 2007-07-18 | 2015-02-03 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8655961B2 (en) | 2007-07-18 | 2014-02-18 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
CN101299256A (en) * | 2008-06-18 | 2008-11-05 | 深圳市永达电子有限公司 | Method and system for recognizing electric contract based on grid computing and data integration |
-
2010
- 2010-03-15 SG SG10201400603VA patent/SG10201400603VA/en unknown
- 2010-03-15 AU AU2010223873A patent/AU2010223873B2/en active Active
- 2010-03-15 CN CN201080020761.3A patent/CN102422269B/en not_active Expired - Fee Related
- 2010-03-15 CA CA2755286A patent/CA2755286C/en active Active
- 2010-03-15 US US12/724,147 patent/US8239496B2/en active Active
- 2010-03-15 EP EP10751541A patent/EP2406715A4/en not_active Withdrawn
- 2010-03-15 WO PCT/US2010/027326 patent/WO2010105262A1/en active Application Filing
- 2010-03-15 JP JP2011554270A patent/JP5889638B2/en active Active
- 2010-03-15 SG SG2011065562A patent/SG174343A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
CN102422269A (en) | 2012-04-18 |
WO2010105262A1 (en) | 2010-09-16 |
SG174343A1 (en) | 2011-10-28 |
SG10201400603VA (en) | 2014-05-29 |
AU2010223873A1 (en) | 2011-10-13 |
EP2406715A1 (en) | 2012-01-18 |
JP5889638B2 (en) | 2016-03-30 |
US20100287260A1 (en) | 2010-11-11 |
EP2406715A4 (en) | 2013-01-16 |
AU2010223873B2 (en) | 2016-08-11 |
US8239496B2 (en) | 2012-08-07 |
CA2755286A1 (en) | 2010-09-16 |
JP2012520530A (en) | 2012-09-06 |
CN102422269B (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2755286C (en) | Systems and methods for document management transformation and security | |
Nadkarni et al. | Preventing accidental data disclosure in modern operating systems | |
US8024304B2 (en) | Document classification toolbar | |
EP2115607B1 (en) | Provisioning of digital identity representations | |
JP5010615B2 (en) | Security token with viewable claims | |
US8156537B2 (en) | Method and system for access control using resource filters | |
US8479006B2 (en) | Digitally signing documents using identity context information | |
US20090205018A1 (en) | Method and system for the specification and enforcement of arbitrary attribute-based access control policies | |
US8584016B2 (en) | System and method for verifying an electronic document | |
US8493581B2 (en) | Electronic document having authentication function | |
US7975143B2 (en) | Method, system, and program product for generating and validating digital signatures | |
JP2002259897A (en) | Electronic document processing device and method | |
AU2011200740B2 (en) | Document classification toolbar | |
Tari et al. | A dynamic label checking approach for information flow control in web services | |
JP2001103048A (en) | Method and device for managing information and information management program storage medium | |
CN114139127A (en) | Authority management method of computer system | |
Mitrakas | Soft law constraints in eGovernment | |
Blobel et al. | Secure interoperability of patient data cards in health networks | |
CN107864313A (en) | A kind of image processing method, terminal and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20150216 |